Web services : principles and technology
Bookreader Item Preview
Share or Embed This Item
- Publication date
- 2008
- Topics
- Web services, World wide web, Webservices, Web Services
- Publisher
- Harlow, England ; New York : Pearson/Prentice Hall
- Collection
- internetarchivebooks; inlibrary; printdisabled
- Contributor
- Internet Archive
- Language
- English
- Item Size
- 1.9G
xxxii, 752 pages : 24 cm
Web services represent the next generation of web-based technology. They allow new and improved ways for enterprise applications to communicate and integrate with each other and, as such, are having a profound effect on both the worlds of business and of software development
"First published 2008"--Title page verso
Includes bibliographical references (pages 727-739) and index
I. BASICS -- 1. Web services basics [1.1 Introduction {1.1.1 What are Web services? -- 1.1.2 Typical Web services scenarios} -- 1.2 The concept of software as a service -- 1.3 A more complete definition of Web services -- 1.4 Characteristics of Web services {1.4.1 Types of Web services (1.4.1.1 Simple or informational services -- 1.4.1.2 Complex services or business processes) -- 1.4.2 Functional and non-functional properties -- 1.4.3 State properties -- 1.4.4 Loose coupling -- 1.4.5 Service granularity -- 1.4.6 Synchronicity -- 1.4.7 Well-definedness -- 1.4.8 Service usage context} -- 1.5 Service interface and implementation -- 1.6 The service-oriented architecture {1.6.1 Roles of interaction in the SOA (1.6.1.1 Web services provider -- 1.6.1.2 Web services requestor -- 1.6.1.3 Web services registry) -- 1.6.2 Operations in the SOA (1.6.2.1 The publish operation -- 1.6.2.2 The find operation -- 1.6.2.3 The bind operation) -- 1.6.3 SOA: an example involving complex services -- 1.6.4 Layers in an SOA} -- 1.7 The Web services technology stack -- 1.8 Quality of service (QoS) -- 1.9 Web services interoperability -- 1.10 Web services versus components -- 1.11 Impact and shortcomings of Web services -- 1.12 Summary -- Review questions -- Exercises] -- II. ENABLING INFRASTRUCTURE -- 2. Distributed computing infrastructure [2.1 Distributed computing and Internet protocols {2.1.1 Internet protocols (2.1.1.1 The Open Systems Interconnection reference model -- 2.1.1.2 The TCP/IP network protocol) -- 2.1.2 Middleware} -- 2.2 The client-server model -- 2.3 Characteristics of interprocess communication {2.3.1 Messaging -- 2.3.2 Message destinations and sockets -- 2.3.3 Synchronous and asynchronous forms of message communication} -- 2.4 Synchronous forms of middleware {2.4.1 Remote procedure calls -- 2.4.2 Remote Method Invocation} -- 2.5 Asynchronous forms of middleware {2.5.1 Store and forward messaging -- 2.5.2 Publish/subscribe messaging -- 2.5.3 Event-driven processing mechanisms -- 2.5.4 Point-to-point queuing} -- 2.6 Request/reply messaging -- 2.7 Message-oriented middleware {2.7.1 Integration brokers -- 2.7.2 The Java Message Service (JMS)} -- 2.8 Transaction-oriented middleware -- 2.9 Enterprise application and e-business integration -- 2.10 Summary -- Review questions -- Exercises] -- 3. Brief overview of XML [3.1 XML document structure {3.1.1 XML declaration -- 3.1.2 Elements -- 3.1.3 Attributes} -- 3.2 URIs and SML namespaces -- 3.3 Defining structure in XML documents {3.3.1 The XML Schema Defintion Language -- 3.3.2 The XML schema document -- 3.3.3 Type definitions, element, and attribute declarations (3.3.3.1 Element declarations -- 3.3.3.2 Attribute declarations) -- 3.3.4 Simple types -- 3.3.5 Complex types} -- 3.4 XML schemas reuse {3.4.1 Deriving complex types (3.4.1.1 Complex type extensions -- 3.4.1.2 Complex type restrictions -- 3.4.1.3 Polymorphism) -- 3.4.2 Importing and including schemas (3.4.2.1 Including schemas -- 3.4.2.2 Importing schemas)} -- 3.5 Document navigation and transformation {3.5.1 The XML Path Language -- 3.5.2 Using XSLT to transform documents} -- 3.6 Summary -- Review questions -- Exercises] -- III. CORE FUNCTIONALITY AND STANDARDS -- 4. SOAP: Simple Object Access Protocol [4.1 Inter-application communication and wire protocols {4.1.1 SOAP as a wire representation} -- 4.2 SOAP as a messaging protocol -- 4.3 Structure of a SOAP message {4.3.1 SOAP envelope -- 4.3.2 SOAP header (4.3.2.1 SOAP intermediaries) -- 4.3.3 SOAP body} -- 4.4 The SOAP communication model {4.4.1 RPC-style Web services -- 4.4.2 Document (message)-style Web services -- 4.4.3 Communication modes and messaging exchange patterns} -- 4.5 Error handling in SOAP -- 4.6 SOAP over HTTP -- 4.7 Advantages and disadvantages of SOAP -- 4.8 Summary -- Review questions -- Exercises] -- 5. Describing Web services [5.1 Why is a service description needed? -- 5.2 WSDL: Web Services Description Language {5.2.1 WSDL interface definition -- 5.2.2 WSDL implementation -- 5.2.3 WSDL message exchange patterns} -- 5.3 Using WSDL to generate client stubs -- 5.4 Non-functional descriptions in WSDL -- 5.5 Summary -- Review questions -- Exercises] -- 6. Registering and discovering Web services [6.1 Service registries -- 6.2 Service discovery -- 6.3 UDDI: Universal description, discovery, and integration {6.3.1 UDDI data structures (6.3.1.1 Service provider information -- 6.3.1.2 Web service description information -- 6.3.1.3 Web service access and technical information -- 6.3.1.4 The publisher assertion structure) -- 6.3.2 WSDL to UDDI mapping model (6.3.2.1 Publishing service interfaces and service bindings -- 6.3.2.2 Publishing service implementations -- 6.3.2.3 Summary of WSDL to UDDI mapping model) -- 6.3.3 The UDDI API (6.3.3.1 Enquiry API -- 6.3.3.2 Publishing API) -- 6.3.4 Querying the UDDI model -- 6.3.5 UDDI usage model and deployment variants} -- 6.4 Summary -- Review questions -- Exercises] -- IV. EVENT NOTIFICATION AND SERVICE-ORIENTED ARCHITECTURES -- 7. Addressing and notification [7.1 Web services and stateful resources -- 7.2 Introduction to the WS-Resource Framework {7.2.1 WS-Addressing -- 7.2.2 WS-Resource -- 7.2.3 Resource properties -- 7.2.4 Resource lifecycle -- 7.2.5 Service groups} -- 7.3 Web Services Notification {7.3.1 Peer-to-peer notification (7.3.1.1 WS-BaseNotification interfaces -- 7.3.1.2 Subscription filtering) -- 7.3.2 Notification topics -- 7.3.3 Brokered notification} -- 7.4 Web Services Eventing -- 7.5 Summary -- Review questions -- Exercises] -- 8. Service-oriented architectures [8.1 What is a software architecture? {8.1.1 System quality attributes -- 8.1.2 Common architectural concerns} -- 8.2 The SOA revisited -- 8.3 Service roles in an SOA -- 8.4 Reliable messaging {8.4.1 Definition and scope of reliable messaging -- 8.4.2 WS-ReliableMessaging (8.4.2.1 Structure of WS-ReliableMessaging -- 8.4.2.2 WS-ReliableMessaging examples)} -- 8.5 The Enterprise Service Bus {8.5.1 The event-driven nature of SOA -- 8.5.2 Key capabilities of an ESB -- 8.5.3 ESB integration styles -- 8.5.4 Elements of an ESB solution (8.5.4.1 Integration brokers -- 8.5.4.2 Application servers -- 8.5.4.3 Business process management -- 8.5.4.4 ESB transport-level choices) -- 8.5.5 Connectivity and translation infrastructure -- 8.5.6 Leveraging legacy assets -- 8.5.7 Scalability issues in an ESB -- 8.5.8 Integration patterns using an ESB} -- 8.6 The extended SOA -- 8.7 Summary -- Review questions -- Exercises] -- V. SERVICE COMPOSITION AND SERVICE TRANSACTIONS -- 9. Processes and workflows [9.1 Business processes and their management {9.1.1 Characteristics of business processes} -- 9.2 Workflows -- 9.3 Business process integration and management -- 9.4 Cross-enterprise business processes -- 9.5 Service composition meta-model {9.5.1 Flow modeling concepts -- 9.5.2 Composing Web services} -- 9.6 Web services orchestration and choreography {9.6.1 Orchestration versus choreography} -- 9.7 The Business Processe Execution Language (BPEL) {9.7.1 BPEL structure (9.7.1.1 Abstract and executable processes -- 9.7.1.2 Message flow -- 9.7.1.3 Control flow -- 9.7.1.4 Data flow -- 9.7.1.5 Process orchestration -- 9.7.1.6 Message correlation -- 9.7.1.7 Fault handling -- 9.7.1.8 Event handling) -- 9.7.2 A simple example in BPEL (9.7.2.1 Process orchestration -- 9.7.2.2 Data handling -- 9.7.2.3 Control flow -- 9.7.2.4 Correlations -- 9.7.2.5 Fault handling and compensations)} -- 9.8 Choreography {9.8.1 Uses of choreography description -- 9.8.2 Web Services Choreography Description Language} -- 9.9 Other initiatives and languages -- 9.10 Summary -- Review questions -- Exercises] -- 10. Transaction processing [10.1 What is a transaction? {10.1.1 Properties of transactions -- 10.1.2 Concurrency control mechanisms} -- 10.2 Distributed transactions {10.2.1 Distributed transaction architectures -- 10.2.2 Two-phase commit protocol (10.2.2.1 Phase I: preparation -- 10.2.2.2 Phase II: commitment/abortion)} -- 10.3 Nested transactions {10.3.1 Closed nested transactions (10.3.1.1 The two-phase commit protocol for nested transactions -- 10.3.1.2 Concurrency control) -- 10.3.2 Open nested transactions (10.3.2.1 Transactional workflows -- 10.3.2.2 Recovery mechanisms)} -- 10.4 Transactional Web services {10.4.1 Definitions and general characteristics of Web services transactions -- 10.4.2 Operational characteristics of Web services transactions -- 10.4.3 Web services transaction types (10.4.3.1 Atomic actions -- 10.4.3.2 Long-duration transactions) -- 10.4.4 Consensus groups and interposition -- 10.4.5 States of Web services transactions -- 10.4.6 Web services transaction frameworks} -- 10.5 WS-Coordination and WS-Transaction {10.5.1 WS-Coordination (10.5.1.1 Coordination context -- 10.5.1.2 Activation service -- 10.5.1.3 Registration service -- 10.5.1.4 Typical message exchange between two applications) -- 10.5.2 WS-Transaction (10.5.2.1 Atomic transaction -- 10.5.2.2 Business activity)} -- 10.6 Web Service Composite Application Framework {10.6.1 Web Service Context -- 10.6.2 Web Service Coordination Framework -- 10.6.3 Web Services Transaction Management} -- 10.7 Summary -- Review questions -- Exercises] --
VI. SERVICE SECURITY AND POLICIES -- 11. Securing Web services [11.1 Web services security considerations {11.1.1 Security threats for Web services -- 11.1.2 Countermeasures} -- 11.2 Network-level security mechanisms {11.2.1 Firewalls (11.2.1.1 Firewall architectures) -- 11.2.2 Intrusion detection systems and vulnerability assessment -- 11.2.3 Securing network communications (11.2.3.1 Symmetric encryption -- 11.2.3.2 Asymmetric encryption -- 11.2.3.3 Digital certificates and signatures)} -- 11.3 Application-level security mechanisms {11.3.1 Authentication (11.3.1.1 Protection domains -- 11.3.1.2 Web resource protection) -- 11.3.2 Authorization -- 11.3.3 Integrity and confidentiality -- 11.3.4 Non-repudiation -- 11.3.5 Auditing -- 11.3.6 Application-level security protocols (11.3.6.1 Secure Sockets Layer (SSL) -- 11.3.6.2 Internet Protocol Security (IPSec) -- 11.3.6.3 Kerberos) -- 11.3.7 Security infrastructures (11.3.7.1 Public-key infrastructure -- 11.3.7.2 Directory services)} -- 11.4 Security topologies -- 11.5 XML security standards {11.5.1 XML Signature -- 11.5.2 XML Encryption -- 11.5.3 XML Key Management Specification (XKMS) (11.5.3.1 XML Key Information Service Specification (X-KISS) -- 11.5.3.2 XML Key Registration Service Specification (X-KRSS)) -- 11.5.4 Security Assertions Markup Language -- 11.5.5 XML Access Control Markup Language (XACML)} -- 11.6 Securing Web services {11.6.1 Web services application-level security challenges -- 11.6.2 Web services security roadmap -- 11.6.3 Web services security model -- 11.6.4 WS-Security (11.6.4.1 A use case for WS-Security -- 11.6.4.2 Integrating WS-Security in SOAs -- 11.6.4.3 WS-Security key features) -- 11.6.5 Managing security policies -- 11.6.6 Managing secure sessions -- 11.6.7 Managing trust -- 11.6.8 Managing privacy -- 11.6.9 Managing federated identities -- 11.6.10 Managing authorization} -- 11.7 Summary -- Review questions -- Exercises] -- 12. Service policies and agreements [12.1 What are policies and why are they needed? {12.1.1 Characteristics of policies -- 12.1.2 The need for a policy language} -- 12.2 Types of policies -- 12.3 Policies and Web services standards -- 12.4 WS-Policy framework {12.4.1 WS-Policy overview (12.4.1.1 Policy expressions -- 12.4.1.2 Policy assertion usage types) -- 12.4.2 Combining and comparing policies (12.4.2.1 Merging policies -- 12.4.2.2 Policy intersection) -- 12.4.3 Policy attachments (12.4.3.1 WSDL policy attachment -- 12.4.3.2 External policy attachment)} -- 12.5 Service agreements {12.5.1 WS-Agreement structure -- 12.5.2 Agreement language} -- 12.6 Summary -- Review questions -- Exercises] -- VII. SERVICE SEMANTICS AND BUSINESS PROTOCOLS -- 13. Semantics and Web services [13.1 The semantic interoperability problem -- 13.2 The role of metadata -- 13.3 Resource Description Framework {13.3.1 The RDF data model -- 13.3.2 RDF syntax -- 13.3.3 RDF Schema} -- 13.4 Richer schema languages -- 13.5 WS-MetadataExchange -- 13.6 Summary -- Review questions -- Exercises] -- 14. Business protocols [14.1 The supply-chain business ecosystem -- 14.2 Semantic problems at the business process level -- 14.3 Business standards and protocols {14.3.1 Electronic Data Interchange -- 14.3.2 RosettaNet (14.3.2.1 The RosettaNet business architecture -- 14.3.2.2 RosettaNet and Web services) -- 14.3.3 The Electronic Business XML initiative (14.3.3.1 The ebXML reference architecture -- 14.3.3.2 ebXML functional phases -- 14.3.3.3 ebXML and Web services)} -- 14.4 XML in vertical organizations -- 14.5 Summary -- Review questions -- Exercises] -- VIII. SERVICE DESIGN AND DEVELOPMENT -- 15. Web services development lifecycle [15.1 Why is a Web services development methodology needed? -- 15.2 Web services development and related methodologies -- 15.3 System development lifecycle -- 15.4 Properties of service-oriented design and development -- 15.5 Service-oriented design and development milestones -- 15.6 Quality of service-oriented design and development {15.6.1 Service coupling -- 15.6.2 Service cohesion -- 15.6.3 Service granularity} -- 15.7 Overview of Web services development lifecycle -- 15.8 The planning phase -- 15.9 The analysis phase {15.9.1 "As-is" process model analysis -- 15.9.2 Business service identification -- 15.9.3 Business service scoping -- 15.9.4 Business service gap analysis -- 15.9.5 Business service realization analysis} -- 15.10 The service design phase {15.10.1 Service design concerns (15.10.1.1 Managing service and component granularity -- 15.10.1.2 Designing for service reusability -- 15.10.1.3 Designing for service composability) -- 15.10.2 Specifying services (15.10.2.1 Structural and behavioral service specification -- 15.10.2.2 Service programming style) -- 15.10.3 Specifying business processes (15.10.3.1 Describing the business process structure -- 15.10.3.2 Describing business roles) -- 15.10.4 Specifying service policies -- 15.10.5 Services integration model} -- 15.11 The service construction phase {15.11.1 Constructing a service: the provider perspective -- 15.11.2 Constructing services: the client perspective} -- 15.12 The service test phase -- 15.13 The service provisioning phase {15.13.1 Service governance -- 15.13.2 Service certification -- 15.13.3 Service metering and rating} -- 15.14 The service deployment phase -- 15.15 The service execution phase -- 15.16 The service monitoring phase -- 15.17 Summary -- Review questions -- Exercises] -- IX. SERVICE MANAGEMENT -- 16. Web services management [16.1 Managing distributed systems {16.1.1 Purpose of distributed systems management -- 16.1.2 Distributed management for Web services} -- 16.2 Enterprise management frameworks -- 16.3 Conceptual management architecture {16.3.1 Management capabilities and functions} -- 16.4 Standard distributed management frameworks {16.4.1 Simple Network Management Protocol -- 16.4.2 Common Information Model/Web-Based Enterprise Management -- 16.4.3 Java Management Extensions} -- 16.5 Web services management {16.5.1 Features of Web services management -- 16.5.2 Functional characteristics of Web services management -- 16.5.3 Service management architectural approaches -- 16.5.4 Management infrastructure services -- 16.5.5 Connecting service management and application channels} -- 16.6 The Web Services Distributed Management Initiative {16.6.1 Management Using Web Services (MUWS) -- 16.6.2 Management of Web Services (MOWS)} -- 16.7 Summary -- Review questions -- Exercises] -- X. EMERGING TRENDS -- 17. Recent trends and developments [17.1 Grid computing {17.1.1 A brief overview of grid computing -- 17.1.2 Features and requirements of grid systems -- 17.1.3 Grid application considerations -- 17.1.4 Grid services} -- 17.2 Mobile computing {17.2.1 Elements of mobile infrastructure -- 17.2.2 Wireless protocols -- 17.2.3 Mobile Web services (17.2.3.1 Mobility considerations -- 17.2.3.2 Field Web services) -- 17.2.4 Mobile Web services standard initiatives (17.2.4.1 The Open Mobile Alliance Initiative -- 17.2.4.2 Mobile Web services framework)} -- 17.3 Summary -- Review questions]
Web services represent the next generation of web-based technology. They allow new and improved ways for enterprise applications to communicate and integrate with each other and, as such, are having a profound effect on both the worlds of business and of software development
"First published 2008"--Title page verso
Includes bibliographical references (pages 727-739) and index
I. BASICS -- 1. Web services basics [1.1 Introduction {1.1.1 What are Web services? -- 1.1.2 Typical Web services scenarios} -- 1.2 The concept of software as a service -- 1.3 A more complete definition of Web services -- 1.4 Characteristics of Web services {1.4.1 Types of Web services (1.4.1.1 Simple or informational services -- 1.4.1.2 Complex services or business processes) -- 1.4.2 Functional and non-functional properties -- 1.4.3 State properties -- 1.4.4 Loose coupling -- 1.4.5 Service granularity -- 1.4.6 Synchronicity -- 1.4.7 Well-definedness -- 1.4.8 Service usage context} -- 1.5 Service interface and implementation -- 1.6 The service-oriented architecture {1.6.1 Roles of interaction in the SOA (1.6.1.1 Web services provider -- 1.6.1.2 Web services requestor -- 1.6.1.3 Web services registry) -- 1.6.2 Operations in the SOA (1.6.2.1 The publish operation -- 1.6.2.2 The find operation -- 1.6.2.3 The bind operation) -- 1.6.3 SOA: an example involving complex services -- 1.6.4 Layers in an SOA} -- 1.7 The Web services technology stack -- 1.8 Quality of service (QoS) -- 1.9 Web services interoperability -- 1.10 Web services versus components -- 1.11 Impact and shortcomings of Web services -- 1.12 Summary -- Review questions -- Exercises] -- II. ENABLING INFRASTRUCTURE -- 2. Distributed computing infrastructure [2.1 Distributed computing and Internet protocols {2.1.1 Internet protocols (2.1.1.1 The Open Systems Interconnection reference model -- 2.1.1.2 The TCP/IP network protocol) -- 2.1.2 Middleware} -- 2.2 The client-server model -- 2.3 Characteristics of interprocess communication {2.3.1 Messaging -- 2.3.2 Message destinations and sockets -- 2.3.3 Synchronous and asynchronous forms of message communication} -- 2.4 Synchronous forms of middleware {2.4.1 Remote procedure calls -- 2.4.2 Remote Method Invocation} -- 2.5 Asynchronous forms of middleware {2.5.1 Store and forward messaging -- 2.5.2 Publish/subscribe messaging -- 2.5.3 Event-driven processing mechanisms -- 2.5.4 Point-to-point queuing} -- 2.6 Request/reply messaging -- 2.7 Message-oriented middleware {2.7.1 Integration brokers -- 2.7.2 The Java Message Service (JMS)} -- 2.8 Transaction-oriented middleware -- 2.9 Enterprise application and e-business integration -- 2.10 Summary -- Review questions -- Exercises] -- 3. Brief overview of XML [3.1 XML document structure {3.1.1 XML declaration -- 3.1.2 Elements -- 3.1.3 Attributes} -- 3.2 URIs and SML namespaces -- 3.3 Defining structure in XML documents {3.3.1 The XML Schema Defintion Language -- 3.3.2 The XML schema document -- 3.3.3 Type definitions, element, and attribute declarations (3.3.3.1 Element declarations -- 3.3.3.2 Attribute declarations) -- 3.3.4 Simple types -- 3.3.5 Complex types} -- 3.4 XML schemas reuse {3.4.1 Deriving complex types (3.4.1.1 Complex type extensions -- 3.4.1.2 Complex type restrictions -- 3.4.1.3 Polymorphism) -- 3.4.2 Importing and including schemas (3.4.2.1 Including schemas -- 3.4.2.2 Importing schemas)} -- 3.5 Document navigation and transformation {3.5.1 The XML Path Language -- 3.5.2 Using XSLT to transform documents} -- 3.6 Summary -- Review questions -- Exercises] -- III. CORE FUNCTIONALITY AND STANDARDS -- 4. SOAP: Simple Object Access Protocol [4.1 Inter-application communication and wire protocols {4.1.1 SOAP as a wire representation} -- 4.2 SOAP as a messaging protocol -- 4.3 Structure of a SOAP message {4.3.1 SOAP envelope -- 4.3.2 SOAP header (4.3.2.1 SOAP intermediaries) -- 4.3.3 SOAP body} -- 4.4 The SOAP communication model {4.4.1 RPC-style Web services -- 4.4.2 Document (message)-style Web services -- 4.4.3 Communication modes and messaging exchange patterns} -- 4.5 Error handling in SOAP -- 4.6 SOAP over HTTP -- 4.7 Advantages and disadvantages of SOAP -- 4.8 Summary -- Review questions -- Exercises] -- 5. Describing Web services [5.1 Why is a service description needed? -- 5.2 WSDL: Web Services Description Language {5.2.1 WSDL interface definition -- 5.2.2 WSDL implementation -- 5.2.3 WSDL message exchange patterns} -- 5.3 Using WSDL to generate client stubs -- 5.4 Non-functional descriptions in WSDL -- 5.5 Summary -- Review questions -- Exercises] -- 6. Registering and discovering Web services [6.1 Service registries -- 6.2 Service discovery -- 6.3 UDDI: Universal description, discovery, and integration {6.3.1 UDDI data structures (6.3.1.1 Service provider information -- 6.3.1.2 Web service description information -- 6.3.1.3 Web service access and technical information -- 6.3.1.4 The publisher assertion structure) -- 6.3.2 WSDL to UDDI mapping model (6.3.2.1 Publishing service interfaces and service bindings -- 6.3.2.2 Publishing service implementations -- 6.3.2.3 Summary of WSDL to UDDI mapping model) -- 6.3.3 The UDDI API (6.3.3.1 Enquiry API -- 6.3.3.2 Publishing API) -- 6.3.4 Querying the UDDI model -- 6.3.5 UDDI usage model and deployment variants} -- 6.4 Summary -- Review questions -- Exercises] -- IV. EVENT NOTIFICATION AND SERVICE-ORIENTED ARCHITECTURES -- 7. Addressing and notification [7.1 Web services and stateful resources -- 7.2 Introduction to the WS-Resource Framework {7.2.1 WS-Addressing -- 7.2.2 WS-Resource -- 7.2.3 Resource properties -- 7.2.4 Resource lifecycle -- 7.2.5 Service groups} -- 7.3 Web Services Notification {7.3.1 Peer-to-peer notification (7.3.1.1 WS-BaseNotification interfaces -- 7.3.1.2 Subscription filtering) -- 7.3.2 Notification topics -- 7.3.3 Brokered notification} -- 7.4 Web Services Eventing -- 7.5 Summary -- Review questions -- Exercises] -- 8. Service-oriented architectures [8.1 What is a software architecture? {8.1.1 System quality attributes -- 8.1.2 Common architectural concerns} -- 8.2 The SOA revisited -- 8.3 Service roles in an SOA -- 8.4 Reliable messaging {8.4.1 Definition and scope of reliable messaging -- 8.4.2 WS-ReliableMessaging (8.4.2.1 Structure of WS-ReliableMessaging -- 8.4.2.2 WS-ReliableMessaging examples)} -- 8.5 The Enterprise Service Bus {8.5.1 The event-driven nature of SOA -- 8.5.2 Key capabilities of an ESB -- 8.5.3 ESB integration styles -- 8.5.4 Elements of an ESB solution (8.5.4.1 Integration brokers -- 8.5.4.2 Application servers -- 8.5.4.3 Business process management -- 8.5.4.4 ESB transport-level choices) -- 8.5.5 Connectivity and translation infrastructure -- 8.5.6 Leveraging legacy assets -- 8.5.7 Scalability issues in an ESB -- 8.5.8 Integration patterns using an ESB} -- 8.6 The extended SOA -- 8.7 Summary -- Review questions -- Exercises] -- V. SERVICE COMPOSITION AND SERVICE TRANSACTIONS -- 9. Processes and workflows [9.1 Business processes and their management {9.1.1 Characteristics of business processes} -- 9.2 Workflows -- 9.3 Business process integration and management -- 9.4 Cross-enterprise business processes -- 9.5 Service composition meta-model {9.5.1 Flow modeling concepts -- 9.5.2 Composing Web services} -- 9.6 Web services orchestration and choreography {9.6.1 Orchestration versus choreography} -- 9.7 The Business Processe Execution Language (BPEL) {9.7.1 BPEL structure (9.7.1.1 Abstract and executable processes -- 9.7.1.2 Message flow -- 9.7.1.3 Control flow -- 9.7.1.4 Data flow -- 9.7.1.5 Process orchestration -- 9.7.1.6 Message correlation -- 9.7.1.7 Fault handling -- 9.7.1.8 Event handling) -- 9.7.2 A simple example in BPEL (9.7.2.1 Process orchestration -- 9.7.2.2 Data handling -- 9.7.2.3 Control flow -- 9.7.2.4 Correlations -- 9.7.2.5 Fault handling and compensations)} -- 9.8 Choreography {9.8.1 Uses of choreography description -- 9.8.2 Web Services Choreography Description Language} -- 9.9 Other initiatives and languages -- 9.10 Summary -- Review questions -- Exercises] -- 10. Transaction processing [10.1 What is a transaction? {10.1.1 Properties of transactions -- 10.1.2 Concurrency control mechanisms} -- 10.2 Distributed transactions {10.2.1 Distributed transaction architectures -- 10.2.2 Two-phase commit protocol (10.2.2.1 Phase I: preparation -- 10.2.2.2 Phase II: commitment/abortion)} -- 10.3 Nested transactions {10.3.1 Closed nested transactions (10.3.1.1 The two-phase commit protocol for nested transactions -- 10.3.1.2 Concurrency control) -- 10.3.2 Open nested transactions (10.3.2.1 Transactional workflows -- 10.3.2.2 Recovery mechanisms)} -- 10.4 Transactional Web services {10.4.1 Definitions and general characteristics of Web services transactions -- 10.4.2 Operational characteristics of Web services transactions -- 10.4.3 Web services transaction types (10.4.3.1 Atomic actions -- 10.4.3.2 Long-duration transactions) -- 10.4.4 Consensus groups and interposition -- 10.4.5 States of Web services transactions -- 10.4.6 Web services transaction frameworks} -- 10.5 WS-Coordination and WS-Transaction {10.5.1 WS-Coordination (10.5.1.1 Coordination context -- 10.5.1.2 Activation service -- 10.5.1.3 Registration service -- 10.5.1.4 Typical message exchange between two applications) -- 10.5.2 WS-Transaction (10.5.2.1 Atomic transaction -- 10.5.2.2 Business activity)} -- 10.6 Web Service Composite Application Framework {10.6.1 Web Service Context -- 10.6.2 Web Service Coordination Framework -- 10.6.3 Web Services Transaction Management} -- 10.7 Summary -- Review questions -- Exercises] --
VI. SERVICE SECURITY AND POLICIES -- 11. Securing Web services [11.1 Web services security considerations {11.1.1 Security threats for Web services -- 11.1.2 Countermeasures} -- 11.2 Network-level security mechanisms {11.2.1 Firewalls (11.2.1.1 Firewall architectures) -- 11.2.2 Intrusion detection systems and vulnerability assessment -- 11.2.3 Securing network communications (11.2.3.1 Symmetric encryption -- 11.2.3.2 Asymmetric encryption -- 11.2.3.3 Digital certificates and signatures)} -- 11.3 Application-level security mechanisms {11.3.1 Authentication (11.3.1.1 Protection domains -- 11.3.1.2 Web resource protection) -- 11.3.2 Authorization -- 11.3.3 Integrity and confidentiality -- 11.3.4 Non-repudiation -- 11.3.5 Auditing -- 11.3.6 Application-level security protocols (11.3.6.1 Secure Sockets Layer (SSL) -- 11.3.6.2 Internet Protocol Security (IPSec) -- 11.3.6.3 Kerberos) -- 11.3.7 Security infrastructures (11.3.7.1 Public-key infrastructure -- 11.3.7.2 Directory services)} -- 11.4 Security topologies -- 11.5 XML security standards {11.5.1 XML Signature -- 11.5.2 XML Encryption -- 11.5.3 XML Key Management Specification (XKMS) (11.5.3.1 XML Key Information Service Specification (X-KISS) -- 11.5.3.2 XML Key Registration Service Specification (X-KRSS)) -- 11.5.4 Security Assertions Markup Language -- 11.5.5 XML Access Control Markup Language (XACML)} -- 11.6 Securing Web services {11.6.1 Web services application-level security challenges -- 11.6.2 Web services security roadmap -- 11.6.3 Web services security model -- 11.6.4 WS-Security (11.6.4.1 A use case for WS-Security -- 11.6.4.2 Integrating WS-Security in SOAs -- 11.6.4.3 WS-Security key features) -- 11.6.5 Managing security policies -- 11.6.6 Managing secure sessions -- 11.6.7 Managing trust -- 11.6.8 Managing privacy -- 11.6.9 Managing federated identities -- 11.6.10 Managing authorization} -- 11.7 Summary -- Review questions -- Exercises] -- 12. Service policies and agreements [12.1 What are policies and why are they needed? {12.1.1 Characteristics of policies -- 12.1.2 The need for a policy language} -- 12.2 Types of policies -- 12.3 Policies and Web services standards -- 12.4 WS-Policy framework {12.4.1 WS-Policy overview (12.4.1.1 Policy expressions -- 12.4.1.2 Policy assertion usage types) -- 12.4.2 Combining and comparing policies (12.4.2.1 Merging policies -- 12.4.2.2 Policy intersection) -- 12.4.3 Policy attachments (12.4.3.1 WSDL policy attachment -- 12.4.3.2 External policy attachment)} -- 12.5 Service agreements {12.5.1 WS-Agreement structure -- 12.5.2 Agreement language} -- 12.6 Summary -- Review questions -- Exercises] -- VII. SERVICE SEMANTICS AND BUSINESS PROTOCOLS -- 13. Semantics and Web services [13.1 The semantic interoperability problem -- 13.2 The role of metadata -- 13.3 Resource Description Framework {13.3.1 The RDF data model -- 13.3.2 RDF syntax -- 13.3.3 RDF Schema} -- 13.4 Richer schema languages -- 13.5 WS-MetadataExchange -- 13.6 Summary -- Review questions -- Exercises] -- 14. Business protocols [14.1 The supply-chain business ecosystem -- 14.2 Semantic problems at the business process level -- 14.3 Business standards and protocols {14.3.1 Electronic Data Interchange -- 14.3.2 RosettaNet (14.3.2.1 The RosettaNet business architecture -- 14.3.2.2 RosettaNet and Web services) -- 14.3.3 The Electronic Business XML initiative (14.3.3.1 The ebXML reference architecture -- 14.3.3.2 ebXML functional phases -- 14.3.3.3 ebXML and Web services)} -- 14.4 XML in vertical organizations -- 14.5 Summary -- Review questions -- Exercises] -- VIII. SERVICE DESIGN AND DEVELOPMENT -- 15. Web services development lifecycle [15.1 Why is a Web services development methodology needed? -- 15.2 Web services development and related methodologies -- 15.3 System development lifecycle -- 15.4 Properties of service-oriented design and development -- 15.5 Service-oriented design and development milestones -- 15.6 Quality of service-oriented design and development {15.6.1 Service coupling -- 15.6.2 Service cohesion -- 15.6.3 Service granularity} -- 15.7 Overview of Web services development lifecycle -- 15.8 The planning phase -- 15.9 The analysis phase {15.9.1 "As-is" process model analysis -- 15.9.2 Business service identification -- 15.9.3 Business service scoping -- 15.9.4 Business service gap analysis -- 15.9.5 Business service realization analysis} -- 15.10 The service design phase {15.10.1 Service design concerns (15.10.1.1 Managing service and component granularity -- 15.10.1.2 Designing for service reusability -- 15.10.1.3 Designing for service composability) -- 15.10.2 Specifying services (15.10.2.1 Structural and behavioral service specification -- 15.10.2.2 Service programming style) -- 15.10.3 Specifying business processes (15.10.3.1 Describing the business process structure -- 15.10.3.2 Describing business roles) -- 15.10.4 Specifying service policies -- 15.10.5 Services integration model} -- 15.11 The service construction phase {15.11.1 Constructing a service: the provider perspective -- 15.11.2 Constructing services: the client perspective} -- 15.12 The service test phase -- 15.13 The service provisioning phase {15.13.1 Service governance -- 15.13.2 Service certification -- 15.13.3 Service metering and rating} -- 15.14 The service deployment phase -- 15.15 The service execution phase -- 15.16 The service monitoring phase -- 15.17 Summary -- Review questions -- Exercises] -- IX. SERVICE MANAGEMENT -- 16. Web services management [16.1 Managing distributed systems {16.1.1 Purpose of distributed systems management -- 16.1.2 Distributed management for Web services} -- 16.2 Enterprise management frameworks -- 16.3 Conceptual management architecture {16.3.1 Management capabilities and functions} -- 16.4 Standard distributed management frameworks {16.4.1 Simple Network Management Protocol -- 16.4.2 Common Information Model/Web-Based Enterprise Management -- 16.4.3 Java Management Extensions} -- 16.5 Web services management {16.5.1 Features of Web services management -- 16.5.2 Functional characteristics of Web services management -- 16.5.3 Service management architectural approaches -- 16.5.4 Management infrastructure services -- 16.5.5 Connecting service management and application channels} -- 16.6 The Web Services Distributed Management Initiative {16.6.1 Management Using Web Services (MUWS) -- 16.6.2 Management of Web Services (MOWS)} -- 16.7 Summary -- Review questions -- Exercises] -- X. EMERGING TRENDS -- 17. Recent trends and developments [17.1 Grid computing {17.1.1 A brief overview of grid computing -- 17.1.2 Features and requirements of grid systems -- 17.1.3 Grid application considerations -- 17.1.4 Grid services} -- 17.2 Mobile computing {17.2.1 Elements of mobile infrastructure -- 17.2.2 Wireless protocols -- 17.2.3 Mobile Web services (17.2.3.1 Mobility considerations -- 17.2.3.2 Field Web services) -- 17.2.4 Mobile Web services standard initiatives (17.2.4.1 The Open Mobile Alliance Initiative -- 17.2.4.2 Mobile Web services framework)} -- 17.3 Summary -- Review questions]
- Access-restricted-item
- true
- Addeddate
- 2020-10-15 17:01:07
- Bookplateleaf
- 0008
- Boxid
- IA1968210
- Camera
- USB PTP Class Camera
- Collection_set
- printdisabled
- External-identifier
-
urn:oclc:record:1204325796
urn:lcp:webservicesprinc0000papa:lcpdf:f918a607-4ccf-448e-8698-5c75eb03a45f
urn:lcp:webservicesprinc0000papa:epub:070443ea-b368-4e3c-acd9-c0a71345b02a - Foldoutcount
- 0
- Grant_report
- Arcadia #4281
- Identifier
- webservicesprinc0000papa
- Identifier-ark
- ark:/13960/t5v78xr69
- Invoice
- 2089
- Isbn
-
9780321155559
0321155556 - Ocr
- ABBYY FineReader 11.0 (Extended OCR)
- Ocr_converted
- abbyy-to-hocr 1.1.11
- Ocr_module_version
- 0.0.14
- Old_pallet
- IA19534
- Openlibrary_edition
- OL10459965M
- Openlibrary_work
- OL9402145W
- Page_number_confidence
- 100
- Page_number_module_version
- 1.0.5
- Pages
- 790
- Ppi
- 300
- Rcs_key
- 24143
- Republisher_date
- 20201015172607
- Republisher_operator
- associate-rochelle-sesaldo@archive.org
- Republisher_time
- 598
- Scandate
- 20201013124209
- Scanner
- station54.cebu.archive.org
- Scanningcenter
- cebu
- Scribe3_search_catalog
- isbn
- Scribe3_search_id
- 9780321155559
- Tts_version
- 4.0-initial-155-gbba175a5
- Full catalog record
- MARCXML
comment
Reviews
389 Previews
7 Favorites
DOWNLOAD OPTIONS
No suitable files to display here.
IN COLLECTIONS
Internet Archive BooksUploaded by station54.cebu on
Open Library